Useful Links
Computer Science
Cybersecurity
Cryptography and Network Security
1. Introduction to Security
2. Classical Encryption Techniques
3. Modern Symmetric Ciphers
4. Public-Key Cryptography and RSA
5. Cryptographic Hash Functions and Message Authentication
6. Digital Signatures and Authentication Protocols
7. Network Security Applications
8. Wireless Network Security
9. System and Infrastructure Security
10. Advanced and Emerging Topics
Classical Encryption Techniques
Symmetric Cipher Model
Components of a Cryptosystem
Plaintext
Message Format
Character Sets
Ciphertext
Encrypted Output
Ciphertext Properties
Key
Key Space
Key Length
Key Distribution
Encryption Algorithm
Algorithm Design
Computational Complexity
Decryption Algorithm
Inverse Operations
Key Recovery
Cryptography vs. Cryptanalysis
Goals of Cryptography
Confidentiality
Authentication
Integrity
Goals of Cryptanalysis
Key Recovery
Message Recovery
Algorithm Breaking
Types of Cryptanalytic Attacks
Ciphertext-Only Attack
Known-Plaintext Attack
Chosen-Plaintext Attack
Chosen-Ciphertext Attack
Adaptive Attacks
Substitution Ciphers
Caesar Cipher
Algorithm and Example
Key Space Analysis
Strengths and Weaknesses
Brute Force Attack
Monoalphabetic Ciphers
Algorithm and Example
Key Space Calculation
Frequency Analysis Attack
Letter Frequency
Digram Analysis
Trigram Analysis
Statistical Cryptanalysis
Playfair Cipher
Algorithm and Key Table
Key Square Construction
Encryption Rules
Decryption Process
Security Considerations
Frequency Analysis Resistance
Known Weaknesses
Hill Cipher
Matrix-based Encryption
Matrix Operations
Modular Arithmetic
Key Requirements
Invertible Matrices
Determinant Conditions
Vulnerabilities
Known-Plaintext Attacks
Linear Algebra Attacks
Polyalphabetic Ciphers
Vigenère Cipher
Algorithm and Key Repetition
Tabula Recta
Encryption Process
Decryption Process
Kasiski Examination
Repeated Patterns
Key Length Determination
Index of Coincidence
Security Analysis
Frequency Analysis Resistance
Key Length Attacks
Transposition Ciphers
Rail Fence Cipher
Algorithm and Example
Zigzag Pattern
Security Analysis
Cryptanalysis Methods
Row-Transposition Ciphers
Simple Columnar Transposition
Keyed Transposition
Key-based Column Ordering
Multiple Rounds
Security Considerations
Anagram Analysis
Pattern Recognition
Steganography
Principles of Steganography
Hiding Information
Carrier Media
Imperceptibility
Methods of Steganography
Text Steganography
Character Spacing
Font Variations
Linguistic Steganography
Image Steganography
Least Significant Bit (LSB)
Palette-based Methods
Transform Domain Methods
Audio Steganography
Echo Hiding
Phase Coding
Spread Spectrum
Video Steganography
Frame-based Hiding
Motion Vector Manipulation
Detection and Countermeasures
Steganalysis Techniques
Statistical Analysis
Visual Inspection
Previous
1. Introduction to Security
Go to top
Next
3. Modern Symmetric Ciphers